>> An "anonymous" proxy, configured specifically to hide the original poster
No, all proxies are per definition anonymous unless they specifically add the 
header X-Forwaded-For.
Otherwise, the IP becomes “automatically” hidden, if it passes communication 
unmodified.

That’s why they have become responsible in many cases. People who don’t 
understand proxies, just set up one, without configuring it properly, and then 
it starts forwarding traffic anonymously without adding any identification 
headers.

>> Like the telecom operator job is to pass any traffic and not to block 
>> anything.
It’s a entirely different thing, when traffic is passed at a lower layer than 
layer 7.
When you pass traffic at a lower layer than layer 7, then you are just a mere 
conduit and the “ISP” exception of responsibility apply.
Same applies if you forward traffic internally in a organization, as you are 
just passing the ethernet packets to its final destination.

When you pass traffic on layer 7, you are the de facto recipient of the 
traffic, and when you then “resend” that received traffic somewhere else than 
its actually destined, you become responsible. That’s why a reverse proxy 
operator becomes responsibility for content he “host”, even if that is just 
forwarded requests to a third-party.

Think like this:
A mail is destined from sen...@sender.com to forwardacco...@forwardoperator.org
forwardacco...@forwardoperator.org then forwards the email to 
someu...@anotheraccount.com

When the first mail is sent, then forwardoperator.org is the defacto recipient 
of the message. They receive the message.
But due to a configuration in their server, that message is now sent (as a new 
message) to someu...@anotheraccount.com

Do you understand why the forward operator (and the proxy operator) receives 
responsibility now?
So its nothing wrong that people who configure a email forward, becomes 
responsible for the messages they forward. It is as it should be.


If you want to do forwarding on a lower level than layer 7, then you simply 
"aim" the domain's MX records to the final SMTP, and then configure that SMTP 
to accept mails for another domain, and LOCALLY forward that email into a 
specific account. That may require a paid account at some email operators.
The local forward will ensure any validations doesn't fail, because then its 
already inside that mail operator's file system, and thus all signatures and 
similar are already verified.

Best regards, Sebastian Nielsen

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to